Proton blog
- Product updates
- Proton Pass
- Privacy guides
Learn what a Bitcoin wallet does and the strengths and weaknesses of custodial,
self-custodial, hardware, and paper wallets.
Discover what pixel tracking is and how it works, how to spot emails that track
you, and how to block these hidden trackers.
- Product updates
- Proton Pass
Take a look at the upcoming features and improvements coming to Proton Pass over
the next several months.
- Product updates
- Proton Pass
Take a look at the upcoming features and improvements coming to Proton Pass over
the next several months.
- For business
- Product updates
- Proton Drive
Gather feedback, track changes, and more with Docs in Proton Drive, a secure
alternative to Google Drive from the privacy experts at Proton.
- For business
- Product updates
- Proton Drive
We've improved Proton Drive for Windows to make it easier to securely
collaborate with others from your desktop.
Learn more about our exclusive Pass + SimpleLogin Lifetime offer. Pay once and
enjoy premium password manager features for life.
It’s time to choose the organizations we should support for the 2024 edition of
our annual charity fundraiser.
- Product updates
- Proton news
As students build their lives online, Proton makes it safe for them to access
educational resources, communicate with each other, and share knowledge online
safely.
We searched the dark web for Danish, Dutch, and Luxembourgish politicians’
official email addresses. In Denmark, over 40% had been exposed.
Students modified smart glasses to find someone’s personal data after just
looking at them. This is why we must minimize data collection.
We searched the dark web for Spanish and Italian politicians’ official email
addresses. Compared to other politicians, they’ve had fewer breaches.
- Privacy guides
Learn what a Bitcoin wallet does and the strengths and weaknesses of custodial,
self-custodial, hardware, and paper wallets.
Discover what pixel tracking is and how it works, how to spot emails that track
you, and how to block these hidden trackers.
Discover insights about what infostealers are, where your stolen information
goes, and ways to protect yourself.
Chinese hackers have compromised US national security by exploiting
government-mandated “backdoors”. The EU should learn from this.
Google is defying the EU Commission and refusing to give people more control
over how they use their Android phones.
Big Tech companies want to chain your passkey to their products. Enter Proton
Pass, which allows you to manage and use passkeys across all devices seamlessly.
- For business
- Product updates
- Proton Drive
Gather feedback, track changes, and more with Docs in Proton Drive, a secure
alternative to Google Drive from the privacy experts at Proton.
- For business
Easy steps and examples for writing a professional email. See how Proton Mail
can make your emails stand out.
Find out what email etiquette is with key rules and examples, why it is
important, and how Proton Mail can help.